Cyberstrike: London


James Barrington - 2020
    7/7/2005: Ben Morgan, a cybersecurity specialist with the Metropolitan police, starts another day at work. It will be the last normal day he ever has.The Present: In Hong Kong, a crime overlord is offered a deal by shadowy agents from Beijing: his life for a new kind of operation in London. Morgan, now a part of an off the books cyber-terrorism prevention unit, must do everything to stop its spread.This is a new kind of war: different goals, tactics, rules, stakes. And Morgan is caught right in the centre... A pulse-pounding thriller rooted in reality, perfect for fans of Frederick Forsyth, Andy McNab and James Deegan.

CompTIA A+ Certification All-In-One For Dummies


Glen E. Clarke - 2009
    1,200 pages of up-to-date information correlates with both the hardware and operating system exams and serves as a reference after the test-taking is completed.The minibooks cover each domain of the exam: A+ Groundwork, Inside the Box, Outside the Box, Maintenance and Troubleshooting, Operating System Basics, Managing The Operating System, Recovering Systems, Networking, and Securing Systems. You'll find plenty of sample test questions to get you prepared, too. CompTIA's A+ certification is vendor-neutral and validates the skills of entry-level computer technicians; it can be the ticket to a new or better job Certification requires successful completion of two exams; this prep guide covers all the core competencies required Nine minibooks cover A+ Groundwork, Inside the Box, Outside the Box, Maintenance and Troubleshooting, Operating System Basics, Managing The Operating System, Recovering Systems, Networking, and Securing Systems Covers installation, configuration, diagnosing, preventive maintenance, and basic networking, with extra information about Vista and a heavier emphasis on hardware Companion CD-ROM include the Dummies Test Engine, an exclusive, fully customizable test-prep software package that includes 400 exam review questions CompTIA A+ Certification All-In-One For Dummies, 2nd Edition is the best study guide to have as you prepare for the A+ exams!Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

OS X 10.10 Yosemite: The Ars Technica Review


John Siracusa - 2014
    Siracusa's overview, wrap-up, and critique of everything new in OS X 10.10 Yosemite.

How to Master CCNA


Rene Molenaar - 2013
    You will learn about the basics of networking like the OSI Model, the difference between IPv4, IPv6, TCP, UDP and more. You will also learn how to configure protocols like spanning-tree, VLANs and trunking on your switches and how routers use routing protocols to build their routing table. This book covers everything for the ICND1 (100-101), ICND2 (200-101) and CCNA combined exam (200-120).

Google+ for Business: How Google's Social Network Changes Everything


Chris Brogan - 2011
    Top social media consultant and Google+ early adopter Chris Brogan shows business people how to leverage its immense potential before their competitors even realize it's there.

Principles of Electronic Communication Systems


Louis E. Frenzel - 1997
    Requiring only basic algebra and trigonometry, the new edition is notable for its readability, learning features and numerous full-color photos and illustrations. A systems approach is used to cover state-of-the-art communications technologies, to best reflect current industry practice. This edition contains greatly expanded and updated material on the Internet, cell phones, and wireless technologies. Practical skills like testing and troubleshooting are integrated throughout. A brand-new Laboratory & Activities Manual provides both hands-on experiments and a variety of other activities, reflecting the variety of skills now needed by technicians. A new Online Learning Center web site is available, with a wealth of learning resources for students. An Instructor Productivity Center CD-ROM features solutions to all problems, PowerPoint lessons, and ExamView test banks for each chapter.

Stealing the Network: How to Own an Identity


Raven Alder - 2005
    Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... Stealing the Network: How to Own an Identity is the 3rd book in the Stealing series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this STN collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.Cast upon a backdrop of Evasion, surviving characters from How to Own a Continent find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.

The Onion Presents a Book of Jean's Own!: All New Wit, Wisdom, and Wackiness from the Onion's Beloved Humor Columnist


Jean Teasdale - 2010
    Now for the first time, li'l ol' me shines front-and-center in a book of my very own! A Book of Jean's Own! features all-original, never-before-published material, and if that wasn't impressive enough, marks the very first Onion book by a solo writer! Historical, huh? My book is sure to find an eager audience among The Onion's ten-million-strong readership. Wait, ten million people? I had no idea! Frankly, that scares me a little. We're not in Kansas anymore, Toto! (Oh shoot, I should have put that hilarious phrase in my book!)A Book of Jean's Own! also marks a departure from past Onion books in that it isn't crammed with headlines and articles in teeny-weeny print! Instead, I write about the stuff that really matters: shopping, chocolate, part-time jobs, and hot Hollywood hunks! Whether you read my book on the bus, the beach, or the toilet, you're guaranteed to find something to chuckle at and deeply relate to!Among the many nuggets of fun:* I tell you the Twenty Things That Are Better Than Sex! * For the first time ever, you learn my maiden name!* I spill the secrets of my scrumptious chocolate-loaded desserts, such as Ooey Gooey Choco-Cocoa-Mocha Cupcakes With Raspberry Filling And Coconut-Cream Cheese-Cola Frosting!* Acquire valuable, real-world tips on coping with a job you dislike, getting through those rough teenage years, and styling a Jean hairdo of your very own!* Get a giggle out of my doodles and overdose on the words of wisdom that are my Jean Proverbs!* You've heard of pity parties—get my tips for throwing your very own self-pity party!* Check out my own cure for the blues, the Plush Jamboree!* Witness my nervous breakdown while writing this book (well, writing is hard, after all!)* Also for the first time ever, Hubby Rick speaks! (Spoiler: It's not entirely in grunts!) * Lots of exclamation points! (And phrases in parentheses!)I'm sure every single one of those ten million readers will buy my book! And who knows? They just may find something in it that will help them lead happier and better lives!

Computer Networks and Internets [With CDROM and Companion Website Access Code Card]


Douglas E. Comer - 1996
    Leading networking authority Douglas Comer presents a wide-ranging, self-contained tour of the concepts, principles, and technologies that enable today's Internet to support applications ranging from web browsing to telephony and multimedia. This Fifth Edition has been thoroughly reorganized, revised, and updated: it includes extensive new coverage of topics ranging from wireless protocols to network performance, while reducing or eliminating coverage of older protocols and technologies. Comer begins by illuminating the applications and facilities offered by today's Internet. Next, he systematically introduces the underlying network technologies and protocols that make them possible: low-level data communications; packet switching, LAN, and WAN technologies; and Internet protocols such as TCP, IP, UDP, and IPv6. With these concepts and technologies established, he introduces several of the most important contemporary issues faced by network implementers and managers, including quality of service, Internet telephony, multimedia, network security, and network management. Comer has carefully designed this book to support both top-down and bottom-up teaching approaches. Students need no background in operating systems, and no sophisticated math: Comer relies throughout on figures, drawings, examples, and analogies, "not" mathematical proofs.

sed and awk Pocket Reference: Text Processing with Regular Expressions


Arnold Robbins - 2000
    sed, awk, and regular expressions allow programmers and system administrators to automate editing tasks that need to be performed on one or more files, to simplify the task of performing the same edits on multiple files, and to write conversion programs.The sed & awk Pocket Reference is a companion volume to sed & awk, Second Edition, Unix in a Nutshell, Third Edition, and Effective awk Programming, Third Edition. This new edition has expanded coverage of gawk (GNU awk), and includes sections on:An overview of sed and awk's command line syntaxAlphabetical summaries of commands, including nawk and gawkProfiling with pgawkCoprocesses and sockets with gawkInternationalization with gawkA listing of resources for sed and awk usersThis small book is a handy reference guide to the information presented in the larger volumes. It presents a concise summary of regular expressions and pattern matching, and summaries of sed and awk.Arnold Robbins, an Atlanta native now happily living in Israel, is a professional programmer and technical author and coauthor of various O'Reilly Unix titles. He has been working with Unix systems since 1980, and currently maintains gawk and its documentation.

HBase: The Definitive Guide


Lars George - 2011
    As the open source implementation of Google's BigTable architecture, HBase scales to billions of rows and millions of columns, while ensuring that write and read performance remain constant. Many IT executives are asking pointed questions about HBase. This book provides meaningful answers, whether you’re evaluating this non-relational database or planning to put it into practice right away. Discover how tight integration with Hadoop makes scalability with HBase easier Distribute large datasets across an inexpensive cluster of commodity servers Access HBase with native Java clients, or with gateway servers providing REST, Avro, or Thrift APIs Get details on HBase’s architecture, including the storage format, write-ahead log, background processes, and more Integrate HBase with Hadoop's MapReduce framework for massively parallelized data processing jobs Learn how to tune clusters, design schemas, copy tables, import bulk data, decommission nodes, and many other tasks

The Tao of Network Security Monitoring: Beyond Intrusion Detection


Richard Bejtlich - 2004
    This book reducesthe investigative workload of computer security incident response teams(CSIRT) by posturing organizations for incident response success.Firewalls can fail. Intrusion-detection systems can be bypassed. Networkmonitors can be overloaded. These are the alarming but true facts aboutnetwork security. In fact, too often, security administrators' tools can serve asgateways into the very networks they are defending.Now, a novel approach to network monitoring seeks to overcome theselimitations by providing dynamic information about the vulnerability of allparts of a network. Called network security monitoring (NSM), it draws on acombination of auditing, vulnerability assessment, intrusion detection andprevention, and incident response for the most comprehensive approach tonetwork security yet. By focusing on case studies and the application of opensourcetools, the author helps readers gain hands-on knowledge of how tobetter defend networks and how to mitigate damage from security incidents.

802.11 Wireless Networks: The Definitive Guide


Matthew S. Gast - 2002
    Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:deployment considerationsnetwork monitoring and performance tuningwireless security issueshow to use and select access pointsnetwork monitoring essentialswireless card configurationsecurity issues unique to wireless networksWith wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide, 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence.

Social Media Marketing for Dummies


Shiv Singh - 2009
    Social media marketing is a cheaper and highly effective way to spread up-to-the-minute news; an easy, inexpensive way to enlarge your audience, customers, and business.Social Media Marketing For Dummies provides an indispensable resource for small businesses and start-ups looking for low-cost online marketing strategies, as well as for marketers in larger companies who want to be more involved with social media. Learn which social media site best fits you and your business and how to:Use Twitter, blogs, Facebook, and other social media outlets to full advantage Create your own online spokesperson for your brand Identify social media sites that appeal to your target audience Tell which social platform works for which objectives Develop a unique, Google-able voice in social media Optimize your page to attract clicks and customers Set up a program to assess your success and measure your results Social Media Marketing helps you learn the art of social media marketing to build your business to its full potential. Includes contributions by Michael Becker, Jeannette Kocsis and Ryan Williams

How the Internet Happened: From Netscape to the iPhone


Brian McCullough - 2018
    In How the Internet Happened, he chronicles the whole fascinating story for the first time, beginning in a dusty Illinois basement in 1993, when a group of college kids set off a once-in-an-epoch revolution with what would become the first “dotcom.”Depicting the lives of now-famous innovators like Netscape’s Marc Andreessen and Facebook’s Mark Zuckerberg, McCullough also reveals surprising quirks and unknown tales as he tracks both the technology and the culture around the internet’s rise. Cinematic in detail and unprecedented in scope, the result both enlightens and informs as it draws back the curtain on the new rhythm of disruption and innovation the internet fostered, and helps to redefine an era that changed every part of our lives.